Purpose-Built Tool
Powered by KeyFlux Core

SIGN

Certified Eligibility Based Document Signing

Sign documents with verifiable credentials instead of passwords. Policy enforcement is automatic. Every signature is cryptographically provable.

The Problem with Document Signing Today

Digital signatures prove a document was signed. They don't prove the signer had authority to sign it.

Password-Based Identity

Signers authenticate with passwords. There is no cryptographic proof of who actually signed or whether they had authority to do so.

No Policy Enforcement

Signing authority limits, departmental restrictions, and approval chains exist in policy documents but are enforced manually, if at all.

Sequential Signing Gaps

Multi-signer workflows rely on email chains and manual tracking. There is no enforced signing order or completion verification.

Audit After the Fact

When disputes arise, proving who signed, under what authority, and whether policy was followed requires manual forensics.

How It Works

Six stages from document upload to verifiable proof. Click any stage to expand.

Key Capabilities

Credential-Based Identity

Signers authenticate with verifiable credentials from their wallet. No passwords, no shared secrets.

Policy-Enforced Signing

Signing authority limits and departmental rules are evaluated automatically by the RESOLVE engine.

PAdES Signatures (eIDAS)

PAdES digital signatures aligned with eIDAS: SES for standard signing, AES with device attestation for advanced.

Attestation Credentials

Every signing event generates an attestation credential: cryptographic proof that signing followed policy.

Multi-Signer Workflows

Define sequential signing orders. Track completion and enforce signing sequence.

Public Verification

Anyone can verify a signed document: upload the PDF to confirm signatures, policy adherence, and signer identity.

Before & After

Traditional e-signatures prove intent. SIGN proves identity, authority, and policy adherence.

Traditional E-Signatures

Password-based, trust the platform

Identity
Password + email
Authority
Assumed from role
Signature type
Image stamp
Policy enforcement
Manual / honour system
Audit trail
Email logs
Verification
Trust the platform
Multi-signer
Email chains

SIGN

Credential-verified, policy-enforced

Identity
Verifiable credential
Authority
Policy-evaluated per document
Signature type
PAdES digital signature
Policy enforcement
Automated by RESOLVE
Audit trail
Immutable attestation credential
Verification
Cryptographically verifiable
Multi-signer
Enforced sequential order

Get Early Access

SIGN is in private preview. If your organisation needs document signing backed by verifiable credentials and policy enforcement, we want to talk.

Request Access